CVE-2025-70963
Description
Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. This makes permanent API credentials accessible to any script running in the browser context.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Gophish <=0.12.1 exposes each user's long-lived API key in the administrative dashboard's client-side JavaScript, allowing persistent compromise.
Vulnerability
Description Gophish versions 0.12.1 and earlier suffer from an incorrect access control vulnerability. The administrative dashboard injects the user's long-lived API key into a JavaScript object embedded in the HTML page on every login [1][3]. This makes permanent API credentials accessible to any script running in the browser context.
Exploitation
An attacker who can execute arbitrary JavaScript in the administrator's browser—for example, through a cross-site scripting (XSS) attack, malicious browser extension, or compromised web page—can read the API key directly from the DOM [3]. The exposure occurs on every login, so even after regenerating the key, the new key is immediately re-exposed.
Impact
The API key grants privileged access to the Gophish REST API and remains valid outside the web session. An attacker obtaining it can permanently access the application's API, even after the administrator logs out or rotates credentials [3].
Mitigation
As of the latest available version, no official patch has been released. The issue is tracked in the Gophish GitHub repository [3]. Suggested fixes include not embedding long-lived credentials in client-side code and using short-lived session tokens for UI operations. Users should consider avoiding API key usage until a fix is applied.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/gophish/gophishGo | <= 0.12.1 | — |
Affected products
2- Gophish/Gophishdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-9f8m-9547-2gqmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-70963ghsaADVISORY
- github.com/gophish/gophish/issues/9366ghsaWEB
News mentions
0No linked articles in our index yet.